cryptologs

If you liked Netflix’s Stranger Things, here are some podcasts you might enjoy:
  • Welcome to Night Vale (the community news of a small city in the American Southwest where all conspiracy theories are true and a part of every day life; BONUS - canon interracial gay couple as the main couple)
  • The Message (70-year-old message from outer space, cryptology, things are not as they seem)
  • Limetown (everyone in small town disappears and no one knows what happened to them; follow an intrepid journalist as she investigates)
  • The Black Tapes (sister show to TANIS; demons, investigation into the unexplainable, asshole Alpha Skeptic, and the journalist who tries to sort this all out)
  • TANIS (sister show to The Black Tapes; conspiracy, truth, and the investigation of what Tanis really is, plus an “information specialist” named Meerkatnip)
  • Archive 81 (found footage audio series where nothing is quite as it seems and there’s a building that isn’t exactly right)
  • Alice Isn’t Dead (from the people behind WtNV, a truck driver tries to find her missing wife and she runs into a lot of conspiracies along the way)
  • Within the Wires (again, from the people who brought you WtNV, instructional audio guides that slowly reveal a personal story and the revelation that the world the podcast is set in is that great)
  • The Bright Session (imagine what it would be like if the X-Men went to therapy)
  • The Behemoth (a girl and her monster walk across America)
  • Wolf 359 (the absurd misadventures of a small band of eccentric characters on board the Hephaestus Station in orbit around the dwarf star, Wolf 359, where it’s all fun and games until it’s not and the Blessed Eternal just wants a night light)
6

Click for full view.

Everybody else is coming up with new cats for Mutant Atsume. I decided to do something different, and so I came up with possible counterparts for the Neko Atsume food items. Thankfully, I managed to use only one pun.

As always, the idea for Mutant Atsume comes from @suprememeep’s subconscious. The images themselves were made using MS Paint, SAI, and WordPad. For my interpretations of Glunkus and Hobo, see here.

some starship iris thoughts

  • i’m reminded SO MUCH of the long way to a small angry planet
  • having gone and decoded alvy’s message for myself (bc i’m secretly a cryptology nerd and found it difficult to listen to the message as it was played on audio) i find it more likely that alvy was trying to say that the IGR had put the “wrong violet” on the ship to be disappeared, and the other violet liu has vital information and should be found, and the fact that there is a second violet liu now is… just a bonus? but idk
  • JEETER i love him and i love him and krejjh and i love this whole fucking crew whoops
24 days of Books (12)

There are 13 days to Christmas and I thought I would do something a little bit different. So, everyday till Christmas I will post a book recommendation. It will be a math or math related book of course ^_^ Enjoy

The Science of Secrecy by Simon Singh

I have always been a fan of codes, cryptography and cryptanalysis. This book is a great introduction into the history of these concepts. The book beautifully covers the major events who changed the history of cryptology as we know it today. Just some small examples, the book covers how the course of Crimean War was changed by the cracking of “unbreakable” Vigenere code; how the well-timed cracking of a single encoded telegram altered the course of World War I or how the mysteries of the Rosetta stone were revealed. 

It is more on the historic part, but it also has great mathematical descriptions of the theory behind it. It gives exactly the amount of knowledge you need to not make it to technical or theoretical, but very easy to read. This was on the first book I have read on this subject and it definitely made me want to find out about the mathematics behind everything. 

Level of mathematics: I would say you could read it without knowing much about the mathematics necessary for this topic. So, I would say basic knowledge of mathematical concepts is enough. 

Yo. Long time no post. This blog is pretty much dead, though I may revive it in a year.

This is pretty much a life update. There’s hardly anyone of the circles I talked with left on here with the Great Twitter Migration, so I don’t know who this is really for, but if anyone is left on here, hey, I’m alive. My graphics card died back in February, so I’ve been missing from FFXIV and I no longer have an Internet connection to my pc due to a small mistake on my parents’ part.

My health has improved and so has life. I’m going into the Air Force as a cryptologic linguist, something very difficult to get into. I was surprised I qualified. I scored 94 on the ASVAB and 112 on the DLAB. It felt really good.

I’ll be leaving Mississippi for a very long time. I’ll be going to Lackland, TX for BMT and then to Monterey, CA. for tech school. And then, after that, hopefully Goodfellow, TX should I pass the final linguist test.

I’m nervous. Excited. Anxious. So much. Life is going to be vastly different. I’ll be leaving on my brother’s birthday, May 16. I’ll be graduating the week following my birthday.

I, uh, don’t know what else to say currently. Thanks for reading.

Ghost In The Machine

I am haunting the wires,
Conducting with frequencies.
Disturbing the patterns,
Disrupting the sequencings.
Sifting through extumaes,
Connecting anamneses.
Creating the fission,
Inventing anomalies.

I am the mystagogue,
Collecting thanotopses,
Designing the pieces,
Describing all its lyses
Observing confusion,
Collecting the gramaryes.
Affixing metaphors,
Redefining similes.

I am the inconnu,
Of enigmatographies.
Reading connotation,
Inside ideologies.
Finding the surfaces,
Unearthing cryptologies.
Prototyping relics,
Amassing symbologies.

I am incarnate word,
Forming our analogies,
Of the analog self,
Communing realities.
Devising a language,
Fusing our dualities.
Constructing an argot,
Expressing modalities.

@oblivionsvoid

——————————

☆☆FANART☆☆

2

The PGP Word List (“Pretty Good Privacy word list”, also called a biometric word list) is a list of words for conveying data bytes in a clear unambiguous way via a voice channel. They are analogous in purpose to the NATO phonetic alphabet used by pilots, except a longer list of words is used, each word corresponding to one of the 256 unique numeric byte values.

Each byte in a bytestring is encoded as a single word. A sequence of bytes is rendered in network byte order, from left to right. For example, the leftmost (i.e. byte 0) is considered “even” and is encoded using the PGP Even Word table. The next byte to the right (i.e. byte 1) is considered “odd” and is encoded using the PGP Odd Word table. This process repeats until all bytes are encoded. Thus, “E582” produces “topmost Istanbul”, whereas “82E5” produces “miser travesty”.

A PGP public key fingerprint that displayed in hexadecimal as

    E582 94F2 E9A2 2748 6E8B
    061B 31CC 528F D7FA 3F19

would display in PGP Words (the “biometric” fingerprint) as

    topmost Istanbul Pluto vagabond
    treadmill Pacific brackish dictator
    goldfish Medusa afflict bravado
    chatter revolver Dupont midsummer
    stopwatch whimsical cowbell bottomless

The order of bytes in a bytestring depends on Endianness.

anonymous asked:

msgvy'l l rscge ylykp kx vxyfw napti'm t aqmhm hjilx tv flxlmw napti'm t aqmhm hjilx tv xokyu ehw l rscge yi dndv gug'e veex, lpcghcg.

Ren: Look, I’m not good at cryptology. Go ask Emerald.

Ghost In The Machine

I am haunting the wires,
Conducting with frequencies.
Disturbing the patterns,
Disrupting the sequencings.
Sifting through extumaes,
Connecting anamneses.
Creating the fission,
Inventing anomalies.

I am the mystagogue,
Collecting thanotopses,
Designing the pieces,
Describing all its lyses
Observing confusion,
Collecting the gramaryes.
Affixing metaphors,
Redefining similes.

I am the inconnu,
Of enigmatographies.
Reading connotation,
Inside ideologies.
Finding the surfaces,
Unearthing cryptologies.
Prototyping relics,
Amassing symbologies.

I am incarnate word,
Forming our analogies,
Of the analog self,
Communing realities.
Devising a language,
Fusing our dualities.
Constructing an argot,
Expressing modalities.

Three Problems with Deciphering the Indus Script
  1. no firm information is available about its underlying language. Was this an ancestor of Sanskrit or Dravidian, or of some other Indian language family, such as Munda, or was it a language that has disappeared? Linear B was deciphered because the tablets turned out to be in an archaic form of Greek; Mayan glyphs because Mayan languages are still spoken.
  2. no names of Indus rulers or personages are known from myths or historical records: no equivalents of Rameses or Ptolemy, who were known to those studying hieroglyphs from records of ancient Egypt available in Greek. Therefore, even if combinations of Indic symbols appear repeatedly, we have no idea what the equivalent sound might be. It could be a ruler’s name, a stream’s name, really anything.
  3. there is, as yet, no Indus bilingual inscription comparable to the Rosetta Stone (written in Egyptian and Greek). The cracking the Mayan script started in 1876 using a Spanish manuscript from the 1500s that recorded a discussion in colonial Yucatan between a Spanish priest and a Yucatec Mayan-speaking elder about ancient Mayan writing, an equivalent find to the Rosetta Stone. It is conceivable that such a bilingual inscription may exist in Mesopotamia, given its trade links with the Indus civilization, but it has not yet been discovered.
2

Click to full view.

My headcanon of these two kitties (slightly edited for more info/more clarity from these three asks that I sent; the base I used can be found here):

Glunkus legitimately doesn’t realize that they’re creepy. They just want love. Their purr sounds like the dial-up sound, but their meow is actually a perfectly normal meow. Their attributes: glitchy appearance, enthusiastic personality, power level √-1. Their memento is a metal sculpture of a Calabi-Yau space (in all 6 extra dimensions!).

Hobo’s the evil one, but in a sort of lovably ineffectual way; think Dr. Doofenshmirtz from Phineas and Ferb. Their attributes: filthy appearance, “evil” personality, power level -5. The quotation marks on “evil” are required. Their memento is a perfectly preserved dried flower crown.

Hobo actually befriended Glunkus as part of an “evil” plan, but soon actually made friends with them for real. 

Happy holidays, @suprememeep! Both of these cats are incredibly cute!

Writing by Donald Rudolph, OCTOBER 10th, 2013

Burn Ritual - hostile takeover.  Smoke to stunt him
Telephone voodoo.
Testing without veil.  To see the wit on film.  Tell him to proceed.
Farm hands from POP.  Watchers & mud pies.  Lig
Jungle gym guy admires the heart
But she believes in more.
Accrued through N64.  
Cheetos.
Fruity pebbles.
He sold his for athletes global.  
To have supper.
Diminish It for Philosophy.
Tell him.  Ears locally known.  
Shapes drawn out for distractions from Boredom.
Uneasily wrong.  See causes unknown but elves.
Puzzles wanted —
Fishes cooked.  Mosquitos —
Mushrooms.  Crayola Time.
From PB Bots and hit the weights.
Bages carried.
Movies & Pictures lessons.
Lines numbers colors —
These insects — Punts — grasses.
You see & petty.
So leave him Be.
She’s always concerned, so tell her?
Show her the ropes.
Bunk beds.
Racing for you.  Blunts
Alien Intelligence is sought after but ignored by you.

Choking on It.  That does not work.
Ask Not about the animals.
Seekers boarded and I’m stuck playing cryptology with him.
I Don’t want to do puzzles.  But so what?
Daily rounders attacking the Will.
AI produces the Means & Questions.
So also the dummies the Liars & the Helpers.  Not ACC BAD.
So OK STAR LAND & Paper Menno
Apple Pie Good.  Battling store good.
Shot selection OK.
Drink UP.
Not Poetry.  Stop It.
She’s nice though.
Reading the clues so to study
did Become The ONE sought After.
Crawling.  Ants Bees Ticks.
Halloween CXW —
Not the Decoys.
Just Annoyences.
OK now you’re Rambling
Stop —
Standing in the meadow.
Just Passed by saw the flowers.
No Because the Planning isn’t sufficient.
Well their systems are flawed.  Ants have interesting qualities about themselves.
Don’t worry just won’t
No Run offs.
Play the Notes, see the ears move.
Poetry? — Pokemon
Slow the deceivers want what?  A few.
So cat & Mouse Dealers
Use of Feed em now Just Joshing?
Test By giving me False shoes.
Moving my toothbrush.
Sending Dummies to “chat”.
What do you —
Stop with the stargazing.
To Be Ready for the energy
Surprised?  Shouldn’t be.
Just watch and see to do what game play.
But zombies aren’t necessary.
Warlocks Dragons?
Fullness with phrases.
Ready But chaos.  Not listening.
Put glass in my Oatmeal.
But I watch I listen.
Think I’m Dumb But You know.
Arrogance and cockiness aside—
Without your scrambling I can work.
Without the frequencies & Brain waves I help with the television.
Muffins, football.  See her she has elegance that’s why I protect her spoken.
She’s compliant isn’t she?
Go to school do work.
Feed him.
The Dark study.
Sifters & Obey the Rules But to what?  
The Decoding is difficult & when Jammed it is phrases.
Aggravating.
You Play too much.
What is the Goal?
Will it ever Reach it’s Peak?
I know that’s why I listen

8

Breaking Enigma  
German military messages enciphered on the Enigma machine were first broken by the Polish Cipher Bureau, beginning in December 1932. This success was a result of efforts by three Polish cryptologists, Marian Rejewski, Jerzy Różycki and Henryk Zygalski, working for Polish military intelligence. Rejewski reverse engineered the device, using theoretical mathematics and material supplied by French military intelligence. Subsequently the three mathematicians designed mechanical devices for breaking Enigma ciphers, including thecryptologic bomb. From 1938 onwards, additional complexity was repeatedly added to the Enigma machines, making decryption more difficult and requiring larger numbers of equipment and personnel–more than the Poles could readily produce.On 25 July 1939, in Warsaw, the Poles initiated French and British military intelligence representatives into their Enigma-decryption techniques and equipment, including Zygalski sheets and the cryptologic bomb, and promised each delegation a Polish-reconstructed Enigma. The demonstration represented a vital basis for the later British continuation and effort.During the war, British cryptologists decrypted a vast number of messages enciphered on Enigma. The intelligence gleaned from this source, codenamed “Ultra” by the British, was a substantial aid to the Allied war effort
The Imitation Game is a movie about  Alan Turing who joins to the cryptography team of Hugh Alexander , John Cairncross, Peter Hilton Keith Furman and Charles Richards and is trying to decrypt the Nazi Enigma machine.Then he is naming the Enigma-breaking machine “Christopher” after Turing’s childhood friend. In actuality, this electromechanical machine was called ‘Victory’. Victory was a British Bombe machine, which drew a spiritual legacy from a design by the Polish Cryptanalyst Marian Rejewski. Rejewski designed a machine in 1938 called bomba kryptologiczna which exploited a particular, but temporary, weakness in German operating procedures. A new machine with a different strategy was designed by Turing (with a key contribution from mathematician Gordon Welchman, unmentioned in the film) in 1940.